Page 2,570«..1020..2,5692,5702,5712,572..2,5802,590..»

CompTIA Names Top 10 Applications for Artificial Intelligence and Internet of Things in 2021 Emerging Technology List – PRNewswire

Organizations will invest in technologies that power digital work, automation and human-machine collaboration.

The Emerging Technology Community utilized CompTIA data from a recent quantitative study that consisted of an online survey fielded to professionals during February 2021. A total of 400 businesses based in the United States participated in the survey and identified the most common use cases for IoT and AI. The Emerging Technology Community then narrowed that list to five use cases for each technology based on member input and experience.

"We challenged ourselves to be as relevant as possible, inclusive of our community members' input, and prescriptive with recommendations," said Greg Plum, senior vice president, strategic alliances forMarkee.io and chair of the council. "We made a conscious effort this year to move to a more practical model allowing our audience to understand not only the types of technologies that were emerging, but how they are being leveraged and monetized right now."

Top Artificial Intelligence Use Cases

Top Internet of Things Use Cases

Predictive sales/lead scoring CRM/service delivery optimization Chatbots/digital assistants Asset tracking Industrial monitoring

Cybersecurity Threat Detection Marketing Automation Smart Badges Fleet Management Smart Buildings

"The pandemic has accelerated digital transformation and changed how we work," said Khali Henderson, senior partner at BuzzTheory and vice chair of the Council. "We learned somewhat painfully that traditional tech infrastructure doesn't provide the agility, scalability and resilience we now require. Going forward, organizations will invest in technologies and services that power digital work, automation and human-machine collaboration. Emerging technologies like AI and IoT will be a big part of that investment, which IDC pegs at $656 billion globally this year."

To learn more about the Top 10 Emerging Technologies list and view the infographic visit https://connect.comptia.org/content/infographic/list-of-emerging-technologies.

The CompTIA Emerging Technology Community includes industry executives and thought leaders who have both a keen sense of new technologies, and insight into how to create business opportunities and transform business operations. To learn more about the community and get involved with the group visit https://connect.comptia.org/connect/communities/emerging-technology-community.

About CompTIAThe Computing Technology Industry Association (CompTIA) is a leading voice and advocate for the $5.2 trillion global information technology ecosystem; and the estimated 75 million industry and tech professionals who design, implement, manage, and safeguard the technology that powers the world's economy. Through education, training, certifications, advocacy, philanthropy, and market research, CompTIA is the hub for advancing the tech industry and its workforce. Visithttps://connect.comptia.org/ to learn more.

Media ContactRoger HughlettCompTIA[emailprotected]630-678-8644

SOURCE CompTIA

http://www.comptia.org

Read more:
CompTIA Names Top 10 Applications for Artificial Intelligence and Internet of Things in 2021 Emerging Technology List - PRNewswire

Read More..

Global Radiotherapy Markets 2021-2026 – Artificial Intelligence In Radiotherapy, CyberKnife S7 System, Hypofractionation, PreciseART Adaptive…

Dublin, Aug. 13, 2021 (GLOBE NEWSWIRE) -- The "Global Radiotherapy Market - Analysis By Procedure (External Radiation, Internal Radiation), Product, Application, By Region, By Country (2021 Edition): Market Insights and Forecast with Impact of COVID-19 (2021-2026)" report has been added to ResearchAndMarkets.com's offering.

The global radiotherapy market is forecasted to reach USD 7987.01 Million in the year 2020

Increasing healthcare expenditure on the back of growing disposable income, rapid technological advancements along with high prevalence of cancer is expected to drive the radiotherapy market significantly across the globe.

Further, expanding healthcare infrastructure accompanied with rising R&D activities is expected to propel the radiotherapy market during the forecast period. Artificial Intelligence (AI) is a leading trend in the radiotherapy market and is gaining significant popularity in the market. Incorporation of AI innovation in disease care is expected to improve exactness and speed of analysis, help clinical dynamics, and lead to better results.

For instance, Varian Medical Systems, a US-based manufacturer of radiation oncology medical devices, launched Ethos artificial intelligence radiotherapy device. The traditional treatment arranging process takes days to make an improved radiation treatment conveyance plan; however, the new AI advancements are helping to speed up this procedure.

AI is also expected to include deep learning applications in treatment planning, clinical decision support, and automated image-guided adaptive radiation therapy and genomic/radio-biologic data mining, thus supporting the growth of the market. Virtual and remote care via video consultations, online patient portals, patient wellness apps and remote monitoring provide even more data and are being used to overcome shortages of oncologists and to meet patient demands for more access points. Several significant mergers have been taken place in the radiotherapy industry.

Story continues

For instance, Siemens Healthineers AG has successfully completed the acquisition of Varian Medical Systems, Inc. With Varian, Siemens Healthineers has the most comprehensive portfolio in the MedTech sector, which offers the company considerable potential for value creation.

With a highly integrated approach, Siemens Healthineers will take the global fight against cancer to a new level. The combined company is creating a unique, highly integrated portfolio of imaging, laboratory diagnostics, artificial intelligence and treatment for the global fight against cancer with significant potential for increased value creation.

The North America region dominates the radiotherapy market. Key factors responsible for ample regional demand of radiotherapy equipment include growing incidence of cancer especially, amongst pediatric patients, favorable reimbursement policies and presence of large multinational companies. In addition, high focus on international sales, mergers and acquisitions by key players in the region along with improving economic conditions is anticipated to drive the market in the forecast period.

Key Topics Covered:

1. Market Overview

2. Impact of COVID-19

3. Global Radiotherapy Market Analysis3.1 Global Radiotherapy Market Value, 2016-20263.2 Global Radiotherapy Market Segmentation By Procedure3.2.1 External-Beam Radiation Therapy- Market Size and Forecast (2016-2026)3.2.2 Internal Radiation Therapy- Market Size and Forecast (2016-2026)3.3 Global Radiotherapy Market Segmentation By Product3.3.1 Linear Accelerators- Market Size and Forecast (2016-2026)3.3.2 Proton Therapy- Market Size and Forecast (2016-2026)3.3.3 Compact Advanced Radiotherapy Systems- Market Size and Forecast (2016-2026)3.4 Global Radiotherapy Market Segmentation By Application3.4.1 Breast Cancer- Market Size and Forecast (2016-2026)3.4.2 Prostate Cancer- Market Size and Forecast (2016-2026)3.4.3 Lung Cancer- Market Size and Forecast (2016-2026)3.4.4 Colorectal Cancer- Market Size and Forecast (2016-2026)3.4.5 Others- Market Size and Forecast (2016-2026)3.5 Global Radiotherapy Market: Regional Analysis

4. Regional Radiotherapy Market Analysis4.1 North America4.1.1 North America Radiotherapy Market: Size and Forecast (2016-2026), By Value4.1.2 North America Radiotherapy Market - Prominent Companies4.1.3 Market Segmentation By Procedure (External-Beam Radiation Therapy and Internal Beam Radiation Therapy)4.1.4 Market Segmentation By Product (Linear Accelerators, Proton Therapy and Compact Advanced Radiotherapy Systems)4.1.5 Market Segmentation By Application (Breast Cancer, Lung Cancer, Colorectal Cancer, Prostate Cancer and Others)4.1.6 North America Radiotherapy Market: Country Analysis4.1.7 Market Opportunity Chart of North America Radiotherapy Market - By Country, By Value (Year-2026)4.1.8 Competitive Scenario of North America- By Country4.1.9 United States Radiotherapy Market: Size and Forecast (2016-2026), By Value4.1.10 Prominent Companies in Radiotherapy Market4.1.11 United States Radiotherapy Market Segmentation By Procedure, Product and Application4.1.12 Canada Radiotherapy Market: Size and Forecast (2016-2026), By Value4.1.13 Canada Radiotherapy Market Segmentation By Procedure, Product and Application4.2 Europe4.3 Asia Pacific

5. Market Dynamics5.1 Growth Drivers5.1.1 Increasing incidence & prevalence of cancer5.1.2 Range of Healthcare Applications5.1.3 Increasing Number of Conferences and Symposium to Boost Awareness about Radiation Therapy5.1.4 Favorable Government Initiatives5.1.5 Rising healthcare expenditure across developing countries5.1.6 Technological advancements5.2 Key Trends and Developments5.2.1 Artificial Intelligence In Radiotherapy5.2.2 CyberKnife S7 System5.2.3 Hypofractionation5.2.4 PreciseART Adaptive Radiation Therapy Option5.2.5 Tomotherapy Systems, including Radixact, the next generation Tomotherapy platform5.3 Challenges5.3.1 Lack of adequate healthcare infrastructure5.3.2 Risk of radiation exposure

6. Competitive Landscape6.1 Global Mosquito Repellent Market6.1.1 Key Players - Market Share Comparison6.1.2 Key Players - Revenues Comparison6.1.3 Key Players - Market Cap Comparison6.1.4 Key Players - R&D Expenditures Comparison

7. Company Profiles7.1 Business Overview7.2 Financial Overview7.3 Business Strategies

For more information about this report visit https://www.researchandmarkets.com/r/6shrnp

Continued here:
Global Radiotherapy Markets 2021-2026 - Artificial Intelligence In Radiotherapy, CyberKnife S7 System, Hypofractionation, PreciseART Adaptive...

Read More..

Indian Artificial Intelligence on the field to help the forces – Goa Chronicle – Goa Chronicle

The hi-tech cameras will now help the security forces to have an eagle eye on infiltrations of China and Pakistan through distinct borders as they are designed in such a way that they can detect a vehicle from a wide distance of 20 km.

A widely spread nation like India has been always on target by Pakistan and China over many years in the past. The Indian army as ever keeps an eagle eye on the infiltrators to protect the land and millions of countrymen. In the last few years, the use of technology has been constantly increasing in military operations for surveillance. However, for such advanced technology India until now has to depend on technology-oriented nations like the USA, Russia, and Israel. But now the domestic Artificial Intelligence agencies are witnessing new dawn in the field. For the development of the same, the defense sector and Indian Artificial Intelligence agencies are working hand in hand with sheer efficacy.

For efficient surveillance on the borders of China, India is to put up exceptional cameras on the field. Optimized Electrotech, a startup from Ahmedabad, Gujarat is to play a prominent role in the initiative. Putting it in simple words, the cameras by the new startup will now be keeping an eagle eye on the borders of China and Pakistan. The device holds multiple significant features among which the most prominent is that it can capture the loaded vehicle from a wide range of 20 km and can detect the resource being carried in it viz human or substantial.

Trial Camera on the Chinese border

As per the reports, Optimized Electrotech co-founder Mr. Sandeep Shah claimed to have been put up a camera for the trial base on the Indo-China border. The results came as the camera was successful in catching the details about infiltrations done and the minute movements of the army from neighboring countries.

Specifications of the Hi-tech device

Detection: the camera detects the minute movements of a vehicle from a wide-ranged distance of 30 km and manly movements from a wide-ranged distance of 18 km.

Identification: the vehicle moving in the area belongs to the army or a normally used vehicle will be detected from a distance of 20 km.

Technology: made with artificial intelligence the camera works with Machine learning techniques and informs the control room about the conspicuous movements in the alerting area with its high-resolution image. The camera rotates 360 degrees.

India to root its position in Border surveillance

Co-founder Sandeep Shah asserted it is near to impossible for only three army men to keep an eye on the borders of India widespread across thousand miles and the core reason why technology is needed on the battlefield. The camera will serve the purpose of catching the minutest details and movements in the civilian restricted area and even beyond help the forces safeguard the land.

He further said, India has been a constant customer of America, Russia, and Israel in terms of technology although it costs much higher. In the last few years, Indian policies have witnessed some dramatic changes which have contributed efficiently to the domestic market as the forces now use (mostly) the domestic surveillance systems and technology developed in the nation itself. However, the benchmark in these systems is recorded very high as Afterall the core concern is Indias security. The companies and start-ups related to the defense sectors have also been actively participating. This will enable the real growth of the nation as Atmanirbhar Bharat in the upcoming years and will be rooting its existence in the efficient border surveillance systems.

Defense policy contributed to better opportunities

The government of India passed a Defense Procurement Policy back in the year 2016 and the prominence was laid on domestic weapons and armaments. This widened the opportunities for the Indian start-ups who dreamt of creating such efficient technological weapons and devices which can contribute to the development process. Today, Optimize Electrotech is one of the top 10 defense start-ups inside the boundaries.

Internal Security to be at the core

The cameras fulfill the demand in various other fields as airports, railway stations, and bus stations as well. It can even be used to detect conspicuous movements in government or non-government buildings, public places, etc. The camera is adorned with the latest technology of face recognition, body temperature, thermal image, and many such.

Manufacturing of such is done in Bengaluru with the price ranging from INR 20 lakhs to 3 crores.

The initiative of Atmanirbhar Bharat has been making a great impact on the Indian economy as well as in the growing process of India at a global plinth. As the brains of India, are now working for the betterment of the land, the day isnt far away when India will make it to a platform that it used to be in its glorious history.

The rest is here:
Indian Artificial Intelligence on the field to help the forces - Goa Chronicle - Goa Chronicle

Read More..

The Convergence: Artificial Intelligence and IoT – IoT For All

Artificial Intelligence of Things (AIoT) is the next key step for IoT transforming the process of analyzing data and turning it into action.

IoT will help with a new generation of AI enablement due to the aggregation nature of IoT. At its core, IoT is gathering massive amounts of data. And as that data is processed through the data-hungry algorithms of AI, the analytical and action parts of IoT will be greatly enhanced.

IoT is key for collecting relevant, intelligent data and communicating it to be processed, analyzed, and made actionable. The role of AI within IoT is to streamline making sense out of all the data collected. It will open new channels for IoT Applications, as it will be incredibly efficient to analyze data coming from thousands of endpoints.

The ability to analyze vast quantities of data will lead to many benefits, including:

Increase operational efficiency:The ability of artificial intelligence to predict circumstances based on trends through historical data can increase efficiency for many verticals, including fleet, assets, logistics, and manufacturing.

Boost safety:AIoT can increase safety in several ways. For example, using computer vision on a manufacturing floor to monitor employees or using virtual or augmented reality in hazardous situations. Artificial vision is leveraged in fleet management solutions to monitor driver behavior and use real-time alerts to prevent accidents, such as falling asleep behind the wheel.

Mitigate downtime: In manufacturing, unplanned downtime due to machine or equipment failure is one of the leading causes of revenue loss. With artificial intelligence analyzing data generated through IoT sensors on machine equipment, predictive maintenance can mitigate the risk of unplanned downtime and allow manufacturers to plan for machine maintenance.

Utility automation:In homes, smart buildings, and smart cities, utilities can be managed via AIoT based on trends. Not only does this create ease for consumers and citizens, but it can also increase safety, aid in traffic management, and bolster sustainability.

One of the most encouraging running themes in this new era of IoT is how emerging technologies work strongly together instead of competitively. 5G has incredible speed and low latency, but in mission-critical communications such as robotics and autonomous vehicles the need for lower latency is further supported through edge computing.

Artificial intelligence can run more efficiently when closer to the edge rather than being sent to the cloud for computation. Automation through AI in those mission-critical communications will be utilized to the full potential when leveraging edge computing.

Much like how 5G, the edge, and AIoT can work in support of each other, cloud computing will not be replaced by edge computing. The cloud still provides flexible, agile, and anywhere data access for organizations big and small.

The decision between cloud and edge depends on the individual Applications. Distributed computing allows organizations to pick and choose between the different options. Some Applications might pull together a hybrid cloud approach (public and private) and tie in some edge computing while also leveraging a local data center.

The pitfall to having so many different options in computing and analytics is that it can be difficult to decide which options are optimized for your business case. Thats why working with an expert strategic partner can not only help you make the best decisions but streamline the process to bring your solution to market faster.

Originally posted here:
The Convergence: Artificial Intelligence and IoT - IoT For All

Read More..

Facebook is bringing end-to-end encryption to Messenger calls and Instagram DMs – TechCrunch

Facebook has extended the option of using end-to-end encryption for Messenger voice calls and video calls.

End-to-end encryption (E2EE) a security feature that prevents third-parties from eavesdropping on calls and chats has been available for text conversations on Facebooks flagship messaging service since 2016. Although the company has faced pressure from governments to roll back its end-to-end encryption plans, Facebook is now extending this protection to both voice and video calls on Messenger, which means that nobody else, including Facebook, can see or listen to whats sent or said.

End-to-end encryption is already widely used by apps like WhatsApp to keep personal conversations safe from hackers and criminals, Ruth Kricheli, director of product management for Messenger, said in ablog post on Friday. Its becoming the industry standard and works like a lock and key, where just you and the people in the chat or call have access to the conversation.

Facebook has some other E2EE features in the works, too. Its planning to start public tests of end-to-end encryption for group chats and calls in Messenger in the coming weeks and is also planning a limited test of E2EE for Instagram direct messages. Those involved in the trial will be able to opt-in to end-to-end encrypted messages and calls for one-on-one conversations carried out on the photo-sharing platform.

Beyond encryption, the social networking giant is also updating its expiring messages feature, which is similar to the ephemeral messages feature available on Facebook-owned WhatsApp. Its now offering more options for people in the chat to choose the amount of time before all new messages disappear, from as few as five seconds to as long as 24 hours.

People expect their messaging apps to be secure and private, and with these new features, were giving them more control over how private they want their calls and chats to be, Kricheli added.

News of Facebook ramping up its E2EE rollout plans comes just days after the company changed its privacy settings again.

See the rest here:
Facebook is bringing end-to-end encryption to Messenger calls and Instagram DMs - TechCrunch

Read More..

How to encrypt your computer (and why you should) – Mashable

Privacy Please is an ongoing series exploring the ways privacy is violated in the modern world, and what can be done about it.

Computer security and privacy are daunting subjects that call to mind global ransomware gangs, targeted espionage, and data-hungry behemoths. And yet, often overlooked in this roiling digital miasma is the fact that there's one simple step you can take to protect both your privacy and your security: Encrypting your computer.

Cooper Quintin, a security researcher with the Electronic Frontier Foundation, likens encrypting your computer to the most basic of preventative health measures.

"It's a really fantastic bit of basic security hygiene, like washing your hands or wearing a mask, that anyone can do that really gets you a lot of benefits," he explained over the phone.

Encryption is complicated. But you personally don't need to understand all the behind-the-scenes math, as smart and dedicated people have already figured it out for you.

When discussing encrypting data, experts typically talk about two distinct categories: encryption of data in motion, and encryption of data at rest. For the former, think of things like text messaging. Apps like Signal use end-to-end encryption to ensure messages (data in motion) can't be read by third parties. And that's great! For the latter, which is what this piece is focused on, think about the data that lives on people's computers or phones.

Data that, presumably, you want to keep private.

A properly encrypted hard drive is functionally unreadable to anyone who doesn't have the decryption key. When it comes to an encrypted computer, that's usually just the password used to log in. Unlike deleted data, which is often trivial to recover, encrypted data is truly private appearing as a jumbled mess to any unwelcome eyes.

"Even if you've deleted stuff, people can recover the deleted files from your hard drive," emphasized Quintin. "But, if you've encrypted your hard drive, people won't be able to recover those files."

People store a lot of personal data on their computers tax documents, private photos, health records, journal entries, and who knows what else and even if there are no plans to share that information with the world, if your hard drive isn't encrypted, the chances are a lot higher that its contents will get out.

"The most important reason to encrypt your computer or phone, and this may seem obvious, is so that no can read, without your permission, what's on your computer or your phone," added Quintin. "This is really handy, for example, if somebody were to steal your computer or steal your phone or you were to lose your computer, or your phone."

In the scenario that Quintin lays out, even if thieves get their hands on your computer, the files on that computer remain inaccessible to them.

It's a reminder that even supposed experts occasionally need.

In 2009, journalists studying global e-waste stumbled across a computer hard drive loaded with documents tied to U.S. defense contractor Northrop Grumman. The hard drive was unencrypted, and the journalists reportedly found "hundreds and hundreds of documents about government contracts" and files marked "competitive sensitive."

In August of 2021, Jen Easterly, the director of the Cybersecurity and Infrastructure Security Agency, reiterated the importance of strong encryption calling it "absolutely fundamental."

Essentially, encrypting your computer is a vital step. It's one that should be done today, right now, before you lose, sell, or recycle your computer.

Thankfully, these days encrypting both Macs and and PCs is an easy process even if the onus is on you to make it happen.

"It's a shame that operating systems for laptops and desktops, such as Mac and Windows, are not presenting [encryption] as a default because it's really such a basic step that everyone should take," observed Quinton.

Those looking to take that basic computer hygiene step are in luck, as often there's no additional software or skills required. Most modern computers provide owners a baked-in process (as long as they know where to look).

"The ways that Mac, and Windows, and all of your mobile phones allow you to encrypt your computer are perfectly fine for the vast majority of people," Quintin assured.

Pretty easy.Credit: Screenshot / apple

Click the Apple logo in the upper-left corner of your screen

Select System Preferences > Security & Privacy and then click the FireVault tab

Click the lock icon in the bottom left of the window, then provide the admin name and password (if it's your computer, that's likely just your login info)

Select Turn On FileVault

Chose a recovery method in case you forget your password (Apple explains that part in detail, but a local recovery key is perhaps the most straightforward of the options)

Click Continue, and go about your business as your hard drive encrypts in the background

Sign into your Windows admin account (if it's your computer, that's likely just the account you use day to day)

Click theStartbutton >Settings > Update & Security > Device encryption

If you see the Device encryption option, select Turn on

If you don't see the Device encryption option, then Windows explains that you should search for "Manage BitLocker" using the taskbar, open it up, and then turn the feature on

That's it. You're all done.

Encrypting your hard drive is a great way to protect your personal data from prying eyes. Of course, if you're not careful, it might also protect your data from you.

Unlike with an unencrypted computer, if you lose your password there is not an easy way to retrieve your data. In other words, encryption is like locking your files in a safe forget the combination, and you're in quite the bind.

SEE ALSO: How to blur your house on Google Street View (and why you should)

Thankfully, the EFF's Quintin suggests a few steps you can take to make sure you never get locked out of your newly secure computer system.

For starters, use a password manager to keep a copy of your password. You can also write the password down and give it to a trusted friend or relative, or put it in a safety deposit box.

"Encrypting your hard drive should be the norm," reiterated Quintin.

A norm where all your data is secure and private sure sounds nice. Thankfully, you now know how to make that a reality.

Read more:
How to encrypt your computer (and why you should) - Mashable

Read More..

Apple opens the encryption Pandora’s box – Axios

Apple's plan to scan iPhones for child sexual abuse material (CSAM) provoked immediate criticism that it was opening a door to much broader efforts by governments seeking a way into citizens' devices.

Between the lines: That debate is important, but Apple is also laying out a technical approach that's worthy of the industry's attention.

Driving the news: Apple last week announced its plan to begin scanning iPhones in the U.S. to see if they contain material that has been flagged as illegal by the National Center for Missing and Exploited Children. A separate change would allow parents to be notified if children under 13 are sent nude images.

The big picture: Much of the debate mirrors past encryption controversies, in which encryption proponents have argued that any kind of exception or back door creates vulnerabilities that will be exploited by bad actors, so you might as well not bother using encryption at all.

Indeed, critics of Apple's approach here say that once it starts scanning devices on the client side, it really won't be offering end-to-end encryption at all.

My thought bubble: The immediate blowback suggests that Apple either didn't get the balance right in this instance, or did a bad job of communicating its system, or both.

Apple has explored this in other areas as well including the system that it created with Google to notify users of potential COVID-19 exposure. A mix of information on a device and in the cloud ensured that only a narrow amount of new data about users' health and location was created, and even less was shared.

Even those who criticize Apple over its new CSAM detection feature acknowledge there is some benefit to Apple's approach.

See the rest here:
Apple opens the encryption Pandora's box - Axios

Read More..

Protects User Privacy With Encryption and Authentication – Security Magazine

Protects User Privacy With Encryption and Authentication | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses CookiesBy closing this message or continuing to use our site, you agree to our cookie policy. Learn MoreThis website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.

Go here to read the rest:
Protects User Privacy With Encryption and Authentication - Security Magazine

Read More..

Facebook introduces end-to-end encryption for its voice & video call features – Techstory

Source: WIRED

Facebook Inc., the social media conglomerate introduces end-to-end encryption for its Messenger app for voice and video calls alongside advanced controls for its disappearing messages feature.

The company owns the top four social media apps including WhatsApp, Instagram, Messenger, and its core Facebook app making the social media giant liable for the security and privacy of billions of people across the globe. Facebook first introduced end-to-end encryption in its messenger app for text messages when the company added a secret conversation feature to its app back in 2016.

However, seeing the current scenario where peoples interest in voice and video calls is increasing each day, Facebook has decided to add this feature to its Messenger saying that the app now sees more than a hundred and fifty million video calls a day.

It is a common understanding these days that privacy in any form is a must and that too when it is in regards to the safety of more than a billion users online.

Furthermore, Facebooks chat-oriented app WhatsApp is already offering this feature of end-to-end encryption or E2EE for quite a long time now preventing anybody but the sender and the receiver from seeing the chats between them and everything else is stored in the form of encrypted data in the apps databases.

Having said that, not just WhatsApp and Facebook but many other video calling applications like Apples Facetime and Zoom categorizes and commonly agree upon making end-to-end encryption as industry standards across all messaging apps.

According to rumours, it is anticipated that Facebook will roll out a unified version of the E2EE messaging system across all of its apps but that hasnt happened so far. In addition to this, text chats are also getting a small update for disappearing messages with a few more options for the setting, now allowing users to choose between five seconds and 24 hours as to when the messages in their chats disappear. Originally the feature was offered with 1 minute, fifteen minutes, and 24-hour options.

Engadget notes, the social media giant is also working on a few other features in its beta test offering end-to-end encryption in group chats and calls between family and friends. Not just that, Instagram will also now offer a limited test allowing users to choose if they want E2EE for their direct messages as well.

In conclusion, I think it is a great step forward towards a new and safer social media existence for billions of users using apps for communicating with their family and friends.

View original post here:
Facebook introduces end-to-end encryption for its voice & video call features - Techstory

Read More..

An Overview of Blockchain in Supply Chain: Whats the Link? – JD Supra

Blockchain in Supply Chain: Article 1

Managing the supply chain is one of the biggest challenges faced by modern-day global companies. These companies devote a tremendous amount of resources to investigating inefficiencies and identifying areas of cost reduction.

Forward-thinking companies are now investigating blockchain as a technology that could potentially revolutionize supply chain as we know it. Analysts predict that blockchain technology is capable of improving the contemporary supply chain structure by increasing supply chain trust, efficiency, and transparency.1

Increasingly, supply chain leaders are recognizing that the future of supply chain may lie in blockchain solutions. In 2019, a survey performed by PwC revealed that 24% of industrial manufacturing CEOs were planning, piloting, or implementing blockchain technology.2 Then, in 2020, Deloittes Global Blockchain Survey revealed that 55% of its senior executive and practitioner respondents viewed blockchain as a top priority.3 In 2021, Business Wire reported that the market for blockchain in supply chain is predicted to grow from $253 million in 2020 to over $3 billion by 2026.4

Blockchain is often equated with cryptocurrency, but in fact, blockchain technology has many applications beyond functioning as a virtual currency platform. To understand how blockchain fulfills a need in supply chain, it is first necessary to understand how blockchain works.

A blockchain is a string of encrypted data blocks. Lets break that down: The blocks of the blockchain can be conceptualized like a file containing information (the data), and that information is locked so that only those with the key can access the information (the encryption).

Many files (or blocks) are linked one after another into a chain. Each file (or block) of data includes the following types of information a timestamp to indicate when it was created, historical information about the blocks that precede it in the chain, and information that is new to that block. All the blocks together make up the blockchain.

Computers, laptops, servers, or other computer devices connected to the internet are needed to access the blockchain. When these devices are connected together, they are called nodes of the blockchain. The nodes store the blockchain (and the users of the nodes may be anybody in the world as in permissionless blockchains or may be limited to certain users as in permissioned blockchains, which will be discussed further in a future article in this Blockchain in Supply Chain series).

The storing of the blockchain across the nodes creates a type of distributed ledger, which is a system in which data is stored and shared across multiple sites, countries, or institutions. A distributed ledger can be contrasted with a traditional database in which all the digital data is stored in a centralized location. In the case of blockchain, the different nodes typically store identical data.

In order to add a new block of data to the blockchain, a node must send out a transaction request with the new data to other nodes on the blockchain network, triggering the creation of a block. Before the new block is added to the chain, a select number of nodes must first agree that the addition of the new block to the blockchain is valid. When validating the new block, the nodes confirm that the block is correctly formatted and that it does not contain duplicate transactions. After the block is validated, the encrypted block is added to the string of existing blocks and stored by the other nodes on the blockchain network.

Because blockchain is encrypted and in a distributed ledger format, the data on the blockchain are thought to be virtually unhackable, thereby lending trust and confidence in the data stored on the blockchain.

Although we do not know whether blockchain will revolutionize supply chain any more than we know whether bitcoin will be the currency of the future, several prominent companies are testing blockchain solutions and investigating blockchain uses for their supply chains. By 2023, it is projected that 30% of manufacturing companies with more than $5 billion in revenue will be engaging blockchain technologies.5 To name a few:

In the upcoming articles in this Blockchain in Supply Chain series, we will discuss the above programs in more detail.

Future articles in this Blockchain in Supply Chain series will address the following topics:

1 Building a Transparent Supply Chain, Harvard Business Review (May-June 2020), https://hbr.org/2020/05/building-a-transparent-supply-chain; An Integrated Impact of Blockchain on Supply Chain Applications, Logistics (2021), https://www.mdpi.com/2305-6290/5/2/33/htm.

2 How can blockchain power industrial manufacturing? PwC, https://www.pwc.com/us/en/industries/industrial-products/library/blockchain-industrial-manufacturing.html (last retrieved July 6, 2021).

3 Deloittes 2020 Global Blockchain Survey: From Promise to Reality, Deloitte Insights (2020), https://www2.deloitte.com/content/dam/insights/us/articles/6608_2020-global-blockchain-survey/DI_CIR%202020%20global%20blockchain%20survey.pdf.

4 The Worldwide Blockchain Supply Chain Industry is Expected to Reach $3+ Billion by 2026 ResearchAndMarkets.com. Businesswire (March 16, 2021), https://www.businesswire.com/news/home/20210316005759/en/The-Worldwide-Blockchain-Supply-Chain-Industry-is-Expected-to-Reach-3-Billion-by-2026---ResearchAndMarkets.com.

5 Dimitrov, Biser. How Walmart and Others Are Riding a Blockchain Wave to Supply Chain Paradise, Forbes (December 5, 2019), https://www.forbes.com/sites/biserdimitrov/2019/12/05/how-walmart-and-others-are-riding-a-blockchain-wave-to-supply-chain-paradise/?sh=2c6b6ff47791.

6 Kemp, Leanne, Everledgers Pioneering Blockchain Work for Diamonds, IBM (May 23, 2018), https://www.ibm.com/blogs/think/2018/05/everledger/; Everledger, Forbes (February 12, 2020), https://www.forbes.com/companies/everledger/?sh=5368e9d5bb05.

7 Our Industry Solutions, Everledger, https://everledger.io/industry-solutions/ (last retrieved July 14, 2021).

8 Dimitrov, supra note 5; IBM Food Trust. A New Era for the Worlds Food Supply, IBM, https://www.ibm.com/blockchain/solutions/food-trust (last retrieved July 6, 2021).

9 Amazon Managed Blockchain Now Supports Hyperledger Fabric v.1.4, AWS (September 15, 2020), https://aws.amazon.com/about-aws/whats-new/2020/09/amazon-managed-blockchain-now-supports-hyperledger-fabric-v1-4/; Supply Chain Management, AWS, https://aws.amazon.com/industrial/supply-chain-management/ (last retrieved July 6, 2021); What is Hyperledger? Hyperledger, https://www.hyperledger.org/about (last retrieved July 11, 2021).

[View source.]

Continued here:
An Overview of Blockchain in Supply Chain: Whats the Link? - JD Supra

Read More..